Font Size: a A A

Analysis And Design Of Certificate-based Aggregate Signature Scheme

Posted on:2019-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:B PengFull Text:PDF
GTID:2428330548493813Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of Internet,wireless mobile network is the trend of future network development.Ubiquitous network makes communication more convenient,and things are more closely linked,and life is becoming more intelligent.While bringing us the convenience of life,wireless communication also gives rise to challenge to information security.Digital signature in cryptography is an important technology to ensure the security of data communication.The use of digital signature can guarantee the integrity,authenticity and non repudiation of the information in communication.In many applications,many signatures are involved for transmission and verification at the same time.In such cases,the technique of aggregate signature can be used to aggregate many signatures into one single aggregate signature so that the total length of signatures is greatly reduced.Hence the network transmission pressure is alleviated,and the efficiency for verifying many signatures is improved.With regard to the security of the aggregate signature,the validity of an aggregate signature should be equivalent to the validities of all single signatures used to generate it.However,most of the aggregate signature schemes available in the literature fail to satisfy this security target.Certificate-based Cryptography overcomes the key escrow problem in Identity-based Cryptography.Compared with Certificateless Cryptography,the certificate of a user in Certificate-based Cryptography do not require a secure channel for transmission.The use of public channel for delivering certificates makes us save the communication resources to a great extent.This thesis focuses on the design and application of designated verifier certificate-based aggregate signature schemes.First of all,this thesis reviews some common aggregate signature schemes which aim to achieve the security goal of the equivalence between the validity of the aggregate signature and that of all single signatures.However in most of these schemes,dishonest signers can cooperate and collude each other to produce some invalid single signatures which result in a valid aggregate signature.This is not consistent with the original security target of aggregate signature schemes.We call such kind of attacks as collusion attacks.In this thesis,we introduce the the formal definition of designated verifier certificate-based aggregate signature schemes,and redefine a stronger security model called designated verifier aggregate signature security model.The security underline the new security model ensures the the validity of an aggregate signature is equivalent to the validities of all single signatures used to generate the aggregate signature.Then,we put forward two designated verifier certificate-based aggregate signature schemes—CBAS ? and CBAS ?.The aggregate algorithms of both the CBAS ? and CBAS ? use a hash function to guarantee the security of the aggregate signatures.That is the equivalence between the validity of an aggregate signature and the validities of all single signatures used to generate that aggregate signature.In the two concrete schemes,the generation of an aggregate signature requires a designated verifier in advance.Only the designated verifier has the ability to verify the correctness of aggregate signatures.Theoretical efficiency analysis of the two certificate-based aggregate signature schemes CBAS ? and CBAS ? is carried out and compared with that of Chen Jianneng et al.'s scheme.The security of the scheme is reduced to the difficulty of solving the problem of Computational Diflie-Hellman.In the random oracle model,it is proved that the schemes CBAS ? and CBAS ? are existentially unforgeable under adaptive chosen message and identity attacks as well as collusion attacks.So the two new schemes satisfy the security target in the newly proposed security model for certificate-based aggregate signature schemes.Finally,the certificate-based aggregate signature schemes CBAS ?,CBAS ? and Chen Jianneng et al.'s are implemented,and the efficiency of each scheme is analyzed and compared through experimental data.Although the certificate-based aggregate signature schemes CBAS ? and CBAS ? proposed in this thesis are slightly inefficient than Chen Jianneng et al.'s scheme in generating and verifying aggregate signatures,they can withstand collusion attacks against aggregate signature schemes.We discuss the application of our designated verifier certificate-based aggregate signature schemes.The aggregate signature scheme CBAS ? is applied to bunch verification of the integrity of multiple files in the cloud storage.The characteristics of certificate-based aggregate signatures make it possible to provide efficient solutions for data integrity,authenticity,and non-repudiation in areas such as cloud storage and Vehicular Networking.The study of certificate-based aggregate signature schemes has a theoretical value and practical significance that can be used to promote the security and high performance of wireless mobile networks.
Keywords/Search Tags:Digital Signature, Certificate-based Cryptography, Aggregate Signature, Security Model of Designated Verifier Aggregate Signature Schemes, Existential Unforgeability
PDF Full Text Request
Related items